Financial Cryptography and Data Security 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6052 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Constructive Cryptography - A Primer
- Security Mechanisms with Selfish Players in Wireless Networks
- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory
- Multichannel Protocols to Prevent Relay Attacks
- A Traceability Attack against e-Passports
- Secure Computation with Fixed-Point Numbers
- Implementing a High-Assurance Smart-Card OS
- Unlinkable Priced Oblivious Transfer with Rechargeable Wallets
- Multiple Denominations in E-cash with Compact Transaction Data
- What's in a Name?
- Cryptographic Protocol Analysis of AN.ON
- A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys
- Practical Private Set Intersection Protocols with Linear Complexity
- Design and Implementation of a Key-Lifecycle Management System
- Measuring the Perpetrators and Funders of Typosquatting
- A Learning-Based Approach to Reactive Security
- Embedded SFE: Offloading Server and Network Using Hardware Tokens
- The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
- Building Incentives into Tor
- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections
- Automatically Preparing Safe SQL Queries
- PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure
- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
- Designing for Audit: A Voting Machine with a Tiny TCB
- Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits
- Security Applications of Diodes with Unique Current-Voltage Characteristics
- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication
- All You Can Eat or Breaking a Real-World Contactless Payment System
- Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
- Using Sphinx to Improve Onion Routing Circuit Construction
- Secure Multiparty AES
- Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
- On Robust Key Agreement Based on Public Key Authentication
- A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
- Signatures of Reputation
- Intention-Disguised Algorithmic Trading
- When Information Improves Information Security
- BetterThanPin: Empowering Users to Fight Phishing (Poster)
- Certification Intermediaries and the Alternative (Poster)
- SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs
- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks
- Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols
- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.